Creating raw shellcode by writing a stack only Rust program, includes an injector!
-
Updated
Jul 7, 2024 - Rust
Creating raw shellcode by writing a stack only Rust program, includes an injector!
List of phishing_scam_domains
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
an IPEnumerationTool combining Shodan and Censys APIs for comprehensive insights. Uncover vulnerabilities, enhance cybersecurity, and streamline analysis with merged results and deduplication.
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Cyber Threat Intelligence Data, Indicators, and Analysis
IntelOwl: manage your Threat Intelligence at scale
A simple SSH gateway for deception deployments
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
MITRE ATT&CK Website
txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
Repository contains malware IP addresses of C2 infrastructure
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Overivew of all cyber incidients in Norway
A python module for working with ATT&CK
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."